CA2663181A1 - Integrated security event management system - Google Patents

Integrated security event management system Download PDF

Info

Publication number
CA2663181A1
CA2663181A1 CA002663181A CA2663181A CA2663181A1 CA 2663181 A1 CA2663181 A1 CA 2663181A1 CA 002663181 A CA002663181 A CA 002663181A CA 2663181 A CA2663181 A CA 2663181A CA 2663181 A1 CA2663181 A1 CA 2663181A1
Authority
CA
Canada
Prior art keywords
security
service
real
isems
services
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CA002663181A
Other languages
French (fr)
Other versions
CA2663181C (en
Inventor
Richard N. Lommock
Robert B. Ciora
Christopher Crawford
Michael Cross
Mark D. Kirschner
Joseph P. Schreibeis
William K. Engel
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alstom Transportation Germany GmbH
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of CA2663181A1 publication Critical patent/CA2663181A1/en
Application granted granted Critical
Publication of CA2663181C publication Critical patent/CA2663181C/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/51Discovery or management thereof, e.g. service location protocol [SLP] or web services

Abstract

An integrated security event management system (ISEMS) is disclosed is based on service oriented architecture and includes one or more computers connected to one or more service providing devices. At least one of the computers comprise one or more modules that are adapted to perform the following tasks: tasks to dynamically discover the service providing devices and their services within a transit security domain in about real-time; tasks to acquire asynchronous state information notifications in about real-time from the discovered services; tasks to determine one or more Boolean outcomes from the asynchronous state information in about real-time via a configurable rules engine; and tasks to evaluate the one or more Boolean outcomes in about real-time via a configurable policy engine to determine state changes of one or more security policies.

Description

INTEGRATED SECUR.ITY EVENT MANAGEMENT SYSTEM

FIELD OF THE INVENTION
[0001] The present application relates generally to the field of passenger security systems and particularly to transit security systems.

BACKGROUND OF THE INVENTION
[0002] A public transportation system is one of the most complex environments to secure as its characteristics - open access, multiple and frequent stops, and large geographic coverage areas - make it vulnerable to a variety of threats. As a result, transportation authorities face significant challenges to provide end-to-end, system-wide security for their customers, employees, and assets without impacting the smooth flow of passengers, and vehicles throughout the transit system.
[0003] The field of passenger security systems has been growing into prominence for many years now and especially so after the events of September 11, 2001, in New York, the 2004 Madrid bombings, and the London attacks in 2005 that have brought into prime focus the need for providing transit security, monitoring transit passengers, to identify security-related events, and to provide notification to the authorities to enable them to take timely action.
[0004] The following are reasons why we will need an improved transit security system.
Firstly, time is of the essence when it comes to identifying an event (or sometimes more than one event), providing notification of the identified event and initiating a response action based on the notification to resolve the event. Unless the above actions are performed effectively and efficiently, the provided response may be of little use.
Examples of events include an opening of a door while a transit vehicle is in motion, non-opening of a door when the transit vehicle is at a terminal, detection of unattended baggage, unauthorized entry, smoke, sounding of a fire alarm, breaking of a window, fall of a person, attack of one person by another, initiation of emergency braking, uncommon sounds like the burst of a firearm or explosive, commotion within the transit vehicle, etc.
[0005] Secondly, once the event is detected, the individual security operator has to initiate a series of actions to resolve the identified event. Unfortunately, in existing systems, it becomes inefficient for the security operator to study the event further.
In cases where multiple security events are identified, the security operator receives multiple notifications of the events. It becomes the duty of the security operator to study each of those notifications and respond accordingly.
[0006] Thirdly, the security systems that currently exist in the passenger rail market have been lacking in their sophistication, and have been primarily focused on providing digital recording of closed-circuit television (CCTV) cameras and providing audio telemetry. Each of these service-providing devices acts in an uncontrolled or unsynchronized manner to provide separate notifications of security events. Furthermore, they have been relatively non-intelligent systems, which are typically represented by individual encoding/recording units placed in each of the cars in a train consist and have limited to no capabilities of wireless transmission and synchronization with wayside infrastructure. Also, the current transit security systems are more static and less intelligent.
[0007] Therefore, there is a clear need for a transit security system that overcomes some or all of the inefficiencies of the existing systems.

SUMMARY OF THE INVENTION
[0008] In accordance with one embodiment of the present invention, an integrated security event management system (ISEMS) is disclosed. The ISEMS is based on service-oriented architecture (SOA) and includes one or more computers connected to one or more service-providing devices. At least one of the computers comprises one or more modules that are adapted to perform the following tasks: tasks to dynamically discover the service-providing devices and their services within a transit security domain in about real-time, wherein the service-oriented architecture (SOA) allows for a uniform means of discovery;
tasks to acquire asynchronous state information notifications in about real-time from the discovered services, wherein the service-oriented architecture (SOA) allows for a uniform means of sending and receiving the notifications; tasks to determine one or more Boolean outcomes from the asynchronous state infoxrnation in about real-time via a configurable rules engine, wherein the configurable rules engine is based on at least one of a Boolean, mathematical, statistical or combinational logic; and tasks to evaluate the one or more Boolean outcomes passed from the configurable rules engine in about real-time via a configurable policy engine to determine sta.te changes of one or more security policies, wherein a security policy state change indicates a security event, and wherein the policy engine associates rules with the one or more security policy states and defines actions to be followed when a security policy state change occurs.
[0009] Examples of service-providing devices comprise at least one of onboard train control, train communication and train telemetry systems; access control systems; intrusion detection devices; audio detection devices; motion detection devices; audio content analysis devices; video content analysis devices; video recorders; audio recorders;
fire alarrn devices;
ground-based radar systems; biological sensors; chemical sensors; firewalls;
antivirus; and vulnerability management; a security event management system; an ISEMS; or combinations thereof.
[0010] In accordance with another embodiment of the present invention, a method for providing security event management using an integrated security event management system is disclosed. The method includes the steps of dynamically discovering one or more service-providing devices and their services within a transit security dom.ain in about real-time;
acquiring asynchronous state information notifications in about real-time from the discovered services; evaluating the acquired asyncluonous state information notifications in about real-time to determine one or more Boolean outcomes, using at least one of a Boolean, mathematical, statistical or combinational logic; and evaluating the one or more Boolean outcomes in about real-time to determine state changes of one or more security policies and defmes actions to be followed when a security policy state change occurs.
[00111 In accordance with yet another embodiment of the present invention, a computer-readable media is disclosed. The media includes code adapted to dynamically discover one or more service-providing devices and their services within a transit security domain in about real-time; to acquire asynchronous state information notifications in about real-time from the discovered services; to evaluate the acquired asynchronous state information notifications in about real-time to determine one or more Boolean outcomes using at least one of a Boolean, mathematical, statistical or combinational logic; and to evaluate the one or more Boolean outcomes in about real-time to determine state changes of one or more security policies and defines actions to be followed when a security policy state change.
[0012] In accordance with yet another embodiment of the present invention, a transit security system comprising at least a first and a second integrated security event management systezxz. (ISEMS) is disclosed. The two ISEMS are within a security domain and each ISEMS
is adapted to perform one or more tasks to dynamically discover the service-providing devices and their services within a transit security domain in about real-time, wherein the service-oriented architecture (SOA) allows for a uniform means of discovery;
tasks to acquire asynchronous state information notifications in about real-time from the discovered services, wherein the service-oriented architecture (SOA) allows for a un.iform means of sending and receiving the notifications; tasks to determine one or more Boolean outcomes from the asynchronous state information in about real-time via a configurable rules engine, wherein the configurable rules engine is based on at least one of a Boolean, mathematical, statistical or combinational logic; and tasks to evaluate the one or more Boolean outcomes in about real-time via a configurable policy engine to determine state changes of one or more security policies, wherein a security policy state change indicates a security event, and wherein the policy engine associates rules with the one or more security policy states and defines actions to be followed when a security policy state change occurs.
j00I31 In accordance with yet another embodiment of the present invention, a transit security system is disclosed. The system includes at least one integrated security even:t management system (ISEMS) and an onboard-to-wayside coznmunication system. The ISEMS is adapted to perforrn one or more tasks to dynamically discover the service-providing devices and their services within a transit security domain in about real-time, wherein the service-oriented architecture (SOA) allows for a uniform means of discovery;
tasks to acquire asynchronous state information notifications in about real-time from the discovered services, wherein the service-oriented architecture (SOA) allows for a uniform means of sending and receiving the notifications; tasks to determine one or more Boolean outcomes from the asynchronous state information in about real-time via a configurable rules engine, wherein the configurable ru.les engine is based on at least one of a Boolean, mathematical, statistical or combinational logic; and tasks to evaluate the one or more Boolean outcomes in about real-time via a configurable policy engine to determine state changes of one or more security policies, wherein a security policy state change indicates a security event, and wherein the policy engine associates rules with the one or more security policy states and defines actions to be followed when a security policy state change occurs.
[0014] In accordance with yet another embodiment of the present invention, a transit security system is disclosed. The system includes a transit communication system; and an integrated security event management system (ISEMS). The ISEMS is adapted to laerform one or more tasks to dynamically discover the service-providing devices and their services within a transit security domain in about real-time, wherein the service-oriented architecture (SOA) allows for a uniform means of discovery; tasks to acquire asynchronous state information notifications in about real-time from the discovered services, wherein the service-oriented architecture (SOA) allows for a uniform means of sending and receiving the notifications; tasks to determine one or more Boolean outcomes from the asynchronous state in.fozm.ation in about real-time via a configurable rules engine, wherein the configurable rules engine is based on at least one of a mathematxca.l, a statistical or a combinational logic; and tasks to evaluate the one or more Boolean outcomes in about real-time via a configurable policy engine to determine state changes of one or more security policies, wherein a security policy state change indicates a security event, and wherein the policy engine associates rules with the one or more security policy states and defmes actions to be followed when a security policy state change occurs. The ISEMS uses the transit communication system to perform at least one of the tasks described herein above.

BRIEF DESCRIPTION OF DRAWINGS
100151 The invention may be more completely understood in consideration of the following detailed description of various embodiments of the invention in connection with the accompanying drawings, in which:
[00161 FIG. 1 is a schem.atic representation of how an integrated security event management system (ISEMS) views a transit domain, and how its various components interact with the transit domain;
[00171 FIG. 2 is a graphical representation of rule processing;
[0018] FIG. 3 is another graphical representation of rule processing;
[0019] FIG. 4 is representation of a policy engine state machine;
[0020] FIG. 5 is a block diagram showing the interaction of a portion of an ISEMS when a non-conformant device is connected to it;
[00211 FIG. 6 is a block diagram illustrating an ISEMS configuration tool;
[0022] FIG. 7 is a block diagram illustrating an exemplary coznmunication between two ISEMS; and [00231 FIG. 8 is a flowchart illustrating an exemplary method of operation of an ISEMS.
DETAILED DESCRIPTION OF DRAWINGS
[00241 Within the ISEMS, services provide the fundamental building blocks.
Services may be defined as containers of data and functionality. Within the ISEMS, services are distributed throughout a network and they (services) advertise their presence.
The ISEMS
selects the services it wants to use based on user-defmed requirements to achieve a desired functionality. This approach lends itself to dynamic systems that can be built on the fly through real-time service discovery. The service-providing devices may themselves be either intelligent systems or non-intelligent systems interfaced with intelligent devices.

[0025] Transit security systems and methods, apart from having to monitor rolling stock, need to monitor one or more of the following: stations, terminals, and inter-modal facilities;
bridges and tunnels; maintenance yards and facilities; right of ways, guideways, and track works; operational control centers; administration facilities; and systems and data. In the description herein, the rolling stock is used as a primary example of implementing the present transit security systems and methods. The transit security systems and methods described herein may be applied to one or more elements of a public transportation system, many examples of which are identified above.
[00261 Rolling stock is a very good example of an environtnent which is not static, not centralized, and not located at fixed locations where security personnel, or technology personnel may gain accessibility when needed. Threat to the rollxng stock, or even threat within the rolling stock, may be in the form of vandalism, derailment, explosives, nuclear, biological or chemical releases on board, and/or human/animal attacks on board. One or more of these events can impact other envirom-nents within the transit system.
[00271 The ISEMS represents an onboard mobile security system designed to move intelligence onto the transit vehicle itself. Examples of transit vehicles include passenger rail systems (such as manual and automated people movers, high speed rail, monorail, subways, metros) and other forms of known passenger transportation systems (such as ground, air, water and subterranean). The ISEMS brings together state information notifications from service-providing devices, correlates this information, and may take action based on policies.
Non-limiting examples of service-providing devices include remote sensors (e.g., smoke, motion, chemical, biological, or nuclear), CCTV, digital video monitors, GPS, cameras, train system data, video recorders, passenger information systems, passenger emergency equipment, audio and video analytic engines, metal detectors, access control systems, intrusion detection systems, and wayside security, comfort and safety subsystems. State inforznation notifications contain data and metadata that characterizes the data.
Characterization of the data may include name of the service-providing device (e.g., "engine monitor"), the name of the device-local service providing the data (e.g., "temperature reporting service"), name of the data being reported (e.g., "temperature"), and the native data type (e g,"integer"). For example, data can be "75" and the m.etadata can be "temperature.' State information notification can contain one or more data and their metadata. The ISEMS
will process the state infor.rnation notifications from the one or more service-providing devices in the order in which it (ISEMS) receives the notifications, The ISEMS
refers to an individual piece of data and its characterizing metadata as a "signal."

[0028] The collection of service-providing devices managed by an instance of the ISEMS
forms the security domain. This domain may range, for example, from a single light rail car to a complex metro light rail system consisting of many wayside passenger stations and may also include other forms of public transportation systems such as passenger buses, aircraft, ships, etc. In a different environment, a single domain may encompass one or more of the domains mentioned above such that one domain may communicate with one or few or all of the remaining domains. The ISEMS views everything in the security domain as a service provider.
[0029] Turning now to the figures and referring first to FIG. 1, a transit security system managed by the ISEMS is illustrated. The security domain (not indicated) for the transit system 10 encompasses all the service-providing devices that are managed by an instance of the ISEMS. As explained previously, the ISEMS views all components of the transit security system as services. The ISEMS is configured to communicate with all the service-providing devices within the security domain. In certain implementations, the ISEMS may also comznura..icate outside of the security domain, such as with wayside stations and controls, and even with a different security domain having its own transit security system and a different instance of the ISEMS. One ISEMS may function as a service-providing device to another ISEMS.
[0030] Continuing witli our discussion of FIG. 1, the transit security system 10 includes one or more service-providing devices 20. Each of the service-providing devices 20 provides one or more services 30. The system 10 comprises a service-oriented architecture (SOA) notification interface 40 that receives asynchronous state information notifications 50 from the one or more services 30. The SOA notification interface 40 serializes the information notifications 50 and provides the serialized information notifications 60 to a configurable rules engine 70 (hereinafter "rules engine"). The configurable nature of the rules engine 70 allows the ISEMS to selectively deterxnine which of the state information notifications 60 can affect the rules. In effect, all rules have inputs, but not all inputs feed rules. This means that while the state information notifications 60 may include data that represents a host of parameters, the rules engine will process only those notifications that are required by the rules. These rules can be configured to suit different requirements at different times. The rules engine 70 evaluates the state information notifications 60. Tn addition, inputs to the rules engine 70 may be literals. A "literal" is represented with the same metadata as a "signal," but a literal's value never changes during evaluation of a rule. The rules engine 70 is based on an event driven asynchronous process.

[0031] The rules engine 70 identifies the set of rules within the rules engine affected by any of the state inforznation notifications 60 and applies the rules to the state information notifications to determine a Boolean outcome (TRUE or FALSE) 80 for each of the applied rules. The working of the rules engine will be explained in greater detail in the sections that follow. A rule can be viewed as a logical "IF" statement. An example logical IF statement can be: IF "temperature" is greater than "80" AND "passenger load %" is greater than "75".
This results in a Boolean outcome (TRUE or FALSE) 80.
[0032] The rules engine 70 notifies the policy engine of any state change of the Boolean outcome. This means, when the Boolean outcome 80 transitions from a TRUE to a FALSE
or from a FALSE to a TRUE, the policy enguxe is notified. The results can be time-stainped and stored in the pe:rsistent storage. The Boolean outcome 80 is determined from the data 60 using Boolean, mathematical (algorithm of some sort), statistical (based on past trends/knowledge) ancl/or combinational logic. Description of the rules engine and how it operates can be found in later sections.
[0033] The Boolean outcomes 80 are then evaluated by a configurable policy engine 90 (hereinafter "policy engine") to determine one or more state changes 100 of one or more security policies (not shown).
[0034] FIG. 2 illustrates a policy as a state machine. A policy consists of two states -Active 200 and lnactive 210. For a policy to transition from an Inactive state 210 to an Active state 200, the policy engine 90 must see a Boolean outcome state change (i.e., from a TRUE to a FALSE or vice versa). Each state change has an associated policy that defines what xnust happen when the Boolean outcome state change is detected. The characteristics of a policy and its states, as illustrated in FIG. 2, may be described as follows: (a) a policy will always have a rule to transition to the Active state; (b) the Active state may have one or more actions that will be executed when the policy transitions to the Active state, (c) a policy may have a rule to transition to the Inactive state, (d) the Inactive state may have one or more actions that will execute when the policy transitions to the Inactive state.
[0035] For every rule that has changed state, the policy engine will identify the policy state associated with that rule. Each rule has an associated policy state.
When the Boolean outcome for that rule is TRUE, and the policy is already in the associated policy state, then no transition takes place. When the Boolean outcome for that r-ule is TRUE, and the policy is not in the associated policy state, then a policy state transition takes place.
[0036] When a policy state transition takes place, then the policy engine executes all actions associated with that policy state. Actions may include sending signals 95 back to the rules engine 70. These signals 95 are identical to the output 60 generated by the SOA
notification interface 40. Actions may also include triggering a device control engi.ne 110 to initiate one or more coxnrn.ands 140 to the SOA control interface 120. The interface 120 distributes the commands 130 to the one or more services 30. It should be noted that the control requests depend on the capabilities of the device to which the control requests are being sent. The SOA notification interface 40 and the control interface 120 are responsible for providin:g SOA client functionality which is the abiJity to interface with the services 30.
[0037] Once all identified actions have been executed, the policy engine 90 determines whether any further policy state evaluation is required. This means (a) if a policy is now in the Active state, but has no rule for the Inactive state, then the policy is transitioned to the Inactive state, OR (b) if a policy is now in the Inactive state, but the Boolean outcome of the rule associated with the Active state is TRUE; then the policy is transitioned to the Active state. If a policy state change transition is forced by either (a) or (b), then all actions associated with the new policy state are executed.
[0038] Policies may be classified as security related or non-security related.
The policy engine 90 emits notification 170 of policy state changes to a SOA notification interface 160 for all security related policy state changes.
[0039] The SOA interface 160 will distribute notifications 180 in about real-time to any clients 190 that have subscribed to receive such notifications 180. Fuz-thermore, clients 190 may issue commands 191 to a SOA. control interface 192 to advance one or more policy states. The SOA control interface 192 forwards these commands 193 to the configurable policy engine 90. A state change of a security policy at the request of a client 190 shall propagate through the system (via 100) as if the security policy state change had been determined internally.
[0040] A storage device 150 is present in some implementations to store iUormation 60, 80, 100, 140, and 170 for later use, such as in a forensic analysis of the information. The storage device 150 may, in some implementations, be distributed and/or located outside the ISEMS. Such modifications are to be construed as being within the scope of the application.
[00411 The SOA notification interface 160 and SOA control interface 192 are responsible for providing SOA server functionality, which is the ability to appear as a servicc.
[0042] The ISEMS is built upon open standards. Examples of open standards include, but are not limited to, Universal Plug and Play (UPnP), Extensible Markup Language (XML), Simple Object Access Protocol (SOAP), Web Services Description Language (WSDL) and Transmission Control Protocovlnternet Protocol (TCP/IP). The ISEMS uses service-oriented architecture (SOA) to communicate across a network regardless of the underlying physical medium. This approach lends to a robust, distributed commuiiications data model that enables rapid integration of data from service-providing devices in about real-time.
[00431 In order to provide situational awareness of real-time events in a security domain, the ISEMS acquires, analyzes, and may provide visualization of security related events in the security domain. The ISEMS manages a dynamic security domain that comprises elements that may not be in a predicted state of configuration. An advantage of the ISEMS is that while the elements may not be in a predicted state of configuration, the ISEMS
will still be able to provide a predictable mechanism of identifying and resolving the security events.
[0044] The ISEMS is also capable of distributing key finctions of the overall system amongst various computers. In one embodiment, this distribution of overall ISEMS
workload will provide for the scalability requi.red in cases where the ISEMS
is handling thousands of events per day. Turthermore, given the natu.re of security applications, it may be required that ISEMS processing funetions be capable of physical and logical redundancy. In other words, not only will the physical servers need to be redundant, but critical application services must also be redundant.
[00451 In one embodiment of the present invention, the ISEMS provides notification to all clients that have subscribed to receive the notification. These notifications may include the type of event, the severity of the event, the classification of the event (e.g., security, maintenance, etc.), and associated data from the service-providing devices within the security domain. The service-oriented architechre (SOA) defines the mechanism by which these notifications are delivered. Client devices may be workstations, security console, or another ISEMS, etc.
[00461 The following section explains, with reference to FIG. 3, how the rules engine 70 works. In order to understand the rules engine, the following terminology needs to be defined. A "node" 310 represents a single unit of evaluation and generates a Boolean outcome representing that evaluation. A node can be defined uniquely by its collection of inputs 300, the evaluation performed on those inputs, and another factor referred to as the node's "depth" (discussed later). Nodes can be fed by signals and literals, or a node can be fed by the outcomes of other nodes. Nodes can feed their Boolean outcome forward into other nodes for further evaluation, or a node may feed forward into a special element called a "Terminator" 320. A node only feeds its Boolean outcome forward if the Boolean outcome changes as a result of the evaluation perfor.zxa,ed by that node. This facilitates efficient processing by "short-circuiting" a node. Simply put, if a node's Boolean outcome does not change, then that node's contribution to any forward elements will not change and thus cannot cause a change in the Boolean outcome of that forward element (although that element may be impacted by other evaluations from other nodes). Finally, a node may have a time value associated with it. This denotes the annou.nt of time that a node's Boolean outcome must renia.zn "TRUE" before that outcome is forwarded. A time value of zero is used to indicate that no special timing is indicated for that node. ' [0047] The "Terminator" 320 represents the final Boolean outcome of a Rule.
There will be only one Terminator per Rule. A Terminator has a single node as its input.
A Ter:m.inator maintains a Boolean outcome that mirrors the Boolean outcome of its single input, but a Terminator performs no evaluation of its own, nor can it feed other nodes.
[0048] In summary, evaluation of a single Rule may be defined as an evaluation of one or more nodes. If the Boolean outcome of the Terminator for that Rule changes state, then the Rule itself is considered to have changed its state.
[0049] To facilitate efficient processing of multiple rules simultaneously and to conserve memory, the zules engine builds a Rule "Mesh." A Mesh combines Rule inputs (signals and literals) that are common to many Rules. A Mesh also combines identical nodes from different Rules, allowing a particular evaluation on an identical set of inpu.ts to be performed only once regardless of how many Rules may perform that single unit of evaluation. A node in a Mesh has no knowledge of any Rules in which that node may play a part.
Only a Terminator has specific knowledge of the Rule that it represents.
[0050] To build a Rule Mesh, the rules engine processes a static rule database contained in persistent storage. This database is considered "static" because it does not change as a result of activity within the ZSEMS. However, this static database may be modified by users of the system, and this new configuration loaded by the rules engine. To begin building a Rule Mesh, a single Rule is loaded from the static database. The Rule is analyzed to identify its inputs (signals and literals) and the nodes that will be present in the Mesh. A Terminator 320 is built for the Rule, and links are formed leading backward from the Terminator through the nodes and finally to the inputs that feed the Rule. Note that there may be inputs that do not feed any nodes. These sorts of inputs are referred to as "cargo" data.
This cargo data can be used to provide additional situational awareness to further identify security threats.
[0051] Once all links have been created, each node is assigned a depth. This is a number that represents a single node's distance from the Terminator for that rule. A
Terminator will always have a depth of 0. FIG. 3 illustrates an exemplary representation of the inputs 300, nodes 310 and terzninator 320 created for a single Rule. The terminator 320 is represented at the rightmost edge, and inputs on the leftmost edge. Depths 330, 340, 350 increases from right to left. Depth 330 is ternned as "Depth zero," depth 340 is termed "Depth 1," and depth 350 is termed "Depth 2," and so on. Each left-to-right arrow 227 represents a feed forward.
[0052] For example, "Rule I" may be to check for a cabin temperature within a certain band, say "80" to "100" degrees. There may be a service provider called "cabin-monitor"
which exposes a service called "temperature-service" (cabin-monitor may have many services). "Tern.perature-service" defines a state variable called "Temperature" (temperature-service might have many state variables) that is of type "integer." A
notification will be received when this Temperature changes (actually, this behavior would be defined by the service, but assume that it is defined as so).
(00531 So the Rule expressiozi might be that "Rule 1" is "TRUE" when "signal:cabin-monitor/temperature-servicelTemperature" > "literal:80" and "signal:cabin-monitor/temperature-service/Temperature" < "literal: 100". Using the terms defined earlier, Inputs are signal:cabin-monitor/temperature-service/Temperature; literal:80;
and literal:100.
Nodes (represented by their expressions) are "signal:cabin-monitor/temperature-service/Temperature" > "literal:80"; "signal: cabin-monitor/temperature-service/Temperature"
< "literal: 100"; "signal:cabin-monitor/temperature~service/Temperature" >
"literal:80", and "signal:cabin-monitor/temperature-service/Temperature" < "literal: 100".
C00541 Once this tree-like structure is built for a single Rule, the structure is then incorporated into the Mesh maintained by the rules engine. If a node in the new Rule has identical inputs, evaluation, and depth as an existing node in the Mesh, then the new node is collapsed into the existing node by adding the new node's forward links to the forward links for the existing node. Note that the notion of "depth" is maintained in the Mesh as well.
Once all nodes have been incorporated, a similar process is followed for the Signal and Literal inputs to a Rule. If an input is already represented in the master list of inputs for the Mesh, then the new inputs are collapsed into the old ones by adding the new inputs' forward links to the list of forward links for the existing inputs. Terminators are unique elemen.ts.
The new Rule's Terminator is added to the list of Terminators for the Mesh.
Finally, the list of Signal inputs for the new Rule is placed in a special, separate list unique to that Rule. This list is used later to collect the signal inputs specific to that Rule should the Rule's Boolean outcome change state as a result of an evaluation of the Mesh, [0055) The Rules engine will invoke an evaluation of the Mesh when new signal data is received. Evaluation of a Mesh begins with an empty two-dimensional array. The first dztnension represents the depth. The second dimension represents potential nodes that may require evaluation at a particular depth.
[00561 Evaluation of a Mesh begins with an empty two-dimensional array. The first dimension represents the depth. The second dimension represents potential elements that may require evaluation at a particular depth. In this discussion, an element may refer to either a node or a Terminator.
100571 For each chan.ged signal in the state information notification, each node that is fed by that signal input is placed into the two-dimensional array according to the depths of those nodes. Once this initial population of the array is complete, a Mesh analysis commences.
[0058] The two-dimensional array is analyzed from highest depth value to lowest -elements that are "deeper" in the Mesh are always analyzed first. The rules engine locates the deepest depth slot with nodes present, and initiates an evaluation on each node at that depth. If a node's Boolean outcome does not change state, then no further action is taken. If a node's Boolean outcome changes state as a result of its evaluation, then each forward element fed by that node is inserted into the two-dimensional array accordiiig to depths of those nodes. These elements may be either nodes or Terminators. Note that these forward elements will always have a lower depth value than the node just evaluated.
[0059] Once all elements at a particular depth have been analyzed, the rules engine locates the next lower depth "slot" in the two-dimensional array that contains elements to be analyzed. If such a slot is found, then each element at that depth is analyzed as explained above. If no more elements can be found, then the analysis is complete.
[00601 If at any point during this analysis, a Terxninator is seen, then the Rule represented by that Terminator is considered to have changed state. This Terminator is placed into a separate list along with any other Terminators located during the complete analysis of the two-dimensional array. Note that since Terminators cannot feed other elements, no further processing is invoked at this time for a Terminator, although analysis of the remainder of the two-dimensional array continues.
[00611 Once the two-dimensional array has been exhausted, the separate list of Terminators is checked. If no Terrninators were discovered, then no further processing occurs. For each Tenninator discovered, a notification is created. This notification contains information defining the Rule that has changed state, the new state of the Rule, the fonner state of the Rule, a time stamp, and the list of the latest signal data associated with that Rule.
This includes "cargo" signals. The set of signals local to that Rule was created when the Rule was incorporated into the Mesh and the latest value of each of these Signals is maintained implicitly by the rules engine.
[0062] Once this list of notifications defining the Rules that have changed state has been built, this list is forwarded to the policy engine 90.
[00631 FIG. 4 illustrates an exemplary rule processing for two rules. As will be noticed, there are two terminators 320 as compared to the one terminator in FIG. 3.
Further, FIG. 4 also illustrates how inputs and nodes may be shared between two rules. This is advantageous because it reduces memory usage, and enables faster computations.
100641 In an implementation (as shown in FIG. 5) where the ISEMS must receive state information notifications from a device 500 that is not service oriented, the TSEMS will define an agent 510 that unctions as a gateway to translate information from and send commands to the non-conformant device 500. Such a feature is advantageous in situations where the proposed transit security system needs to be retrofitted onto existing transit systems that have legacy devices. Legacy devices in this present a.pplication are defined as devices that are unable to communicate or work on a service-oriented architecture (SOA) environment. It must be recalled that the ISEMS uses the service-oriented architecture (SOA) to communicate with the various service-providing devices.
[0065] In one implementation, the ISEMS may include one or more digital computers that are programmed to perorm one or more tasks. Tn the discussion herein below, it may be construed that the tasks may be performed in full or in part by one or more computers. The computer (or computers) may be connected to the one or more service-providing devices either directly or indirectly.
[0066] The ISEMS dynamically discovers all the service-providing devices that are connected to the ISEMS domain. The ISEMS may further discover in about real-time when a service-providing device is either newly connected into the security domain or is removed from the security domain. By dynaniically discovering all the service-providing devices, the ISEMS also identifies all the services that are provided by each of the service-providing devices. It is possible for one device to be capable of perfozxning more than one service.
This act of dynamic discovery occurs in about real-time. The ISEMS' ability to dynamically discover the service-providing devices and their services is facilitated by the service-oriented architecture (SOA). The ISEMS relies upon the service-oriented architecture (SOA) to send commands to, and receive asynchronous state information notifications from the service-providing devices.
[0067] The ISEMS then determines one or more Boolean outcomes from the asynchronous state infornnation notifications using one or more of a mathernatical, statistical or a combinational logic. Determination of state changes of one or more security policies occurs by evaluating the one or more Boolean ou.tcornes via a policy engine.
The policy engine associates rules with one or more security policy states and furtffiez' defines actions to be followed when a security policy state change occurs.
[00681 The ISEMS may also emit notifications of the one or more security events within the security domain when the determination of security policy state change indicates the presence of one or more security events. These notifications may be sent using SOA to all the subscribed clients and specific commands may be issued to the one or more services to, for example, correct or mitigate the detected security event. The ISEMS relies upon SOA
functionality to issue the commands. In certain other implementations, when no security event is detected/deterrnined, the transit security system may not emit any notification at all.
[00691 Consider an example of a conxma.nd is to turn all lights in a certain vehicle to an ON state. The command would be received by all devices that have a lighting se-rvice in that paAicular vehicle. Devices that have a lighting service may include, but not limited to, cabin lights, billboard lights, personal reading lamps, emergency lamps, etc. All light devices that are in an OFF state would be required to switch to an ON state. However, all light devices that are already in an ON state would continue to remain in that state.
[0070] When a train network is available, the ISEMS will be capable of utilizing the existing train network and other onboard and train-to-wayside comxnunications infrastructure to manage the security domain. For exaxnple, the ISEMS may use the existing train network to collect train information and to issue commands to onboard services.
Commands may include directing the transit vehicle to stop at the next station or passenger terminal (when there was no previous intention to stop) or to skip the next station or passenger terminal (when there was a previous intention to stop). Other conlnands may include altering the field of view of a recording camera (video device) or initiating the recording of audio from a particular part of the transit vehicle, or providing a voice announcement. In certain instances, the ISEMS may also provide a notification to emergency personnel outside the transit vehicle so that the emergency condition may be mitigated or resolved. A wireless network may also be used by the ISEMS to communicate with the service-providing devices distributed within the security domain.
(0071) In a different embodiment, such as illustrated by FIG. 6, an ISEMS
configuration tool (ICT) 600 may be used to dynamically configure or reconfigure at a later point of operation, the rules engine 70 and the policy engine 90. The ISEMS-configured tool (ICT) 600 is a graphical user interface that allows a system administrator (or anyone skilled or trained) to quickly and easily configure the rules engine 70 and the policy engine 90. The ICT 600 may be configured for both dynamic and static operation.
[00721 In one embodiment, a light rail train may be an ISEMS security domain.
A
separate ISEMS domain may encompass many such trains. This enables the one or more onboard ISEMS domains to work autonomously, managing their specific domains.
In the ISEMS, the same protocols with which the various service-providing devices connect to and communicate data is the same protocol for which one ISEMS domain communicates with other ISEMS domains and services. In this design, everything is a-service and everything can self-organize and communicate:
[00731 In another implementation, the ISEMS may communicate with audio analysis services that provide evaluation capability to identify, for example, suspicious behavior, threat scenarios, and many other potential anomalies. Using the service-oriented architecture (SOA), these services notify the ISEMS when such anomalies are detected.
[0074] In another implementation, the ISEMS may communicate with video analysis services that provide evaluation capability to identify, for example, passenger counting, unattended objects, camera obstruction, crowd density, face recognition, suspicious behavior, threat scenarios, and potential anomalies. Using the service-oriented architecture (SOA), these services notify the ISEMS when such anomalies are detected.
[00751 In a different embodiment, a transit security domain 700, as illustrated in FIG. 7, may encompass two different ISEMS, each functioning in a manner as described previously and additionally also being able to communicate with each other in exchanging security event inform.ation or for aiding in providing dynamic redundancy or both. Such a built-in redundancy may also require the use of an arbitration service to determine which ISEMS
maintains control over the security domain. In a different aspect of the embodiment, both ISEMSs 10 may be obtaining com.mon state information from one or more service-providing devices 30. Tn accordance with yet another different aspect of the present embodiment, more than two ISEMS may finction/interact in a similar manner.
[0076] Based on configuration, the ISEMS may adjust the response of the transit security system in such a way as to provide situational awareness, optimize surveillance, issue alarms and perform other functians depending on the nature of a detected event.
Examples of functions include sending passenger alarm inforniation; triggering passenger znformation announcements; contacting fire, police, or train recovery personnel; rerouting trains either noticeably or covertly; reconfiguring sensor data pathways; adjusting audio sampling rate;
adjusting video resolution; or disabling one or more malfunctioning sensor devices.
[0077] The following sections describe operation of the ISEMS in an exemplary situation. In order to aid in better understanding, the arrangement of FIG. I
may be used.
Actual devices that correspond to each of the components of FIG. 1 have been assigned similar reference numbers. Consider a case where a commuter rail operator has experienced an increased incidence of unauthorized personnel entering out of service cars in their maintenance yards. The operator would like to enforce a policy that notifies security personnel of any entries into cars in the maintenance facility. In this scenario, the operator would like any instance of unauthorized entry into a vehicle that is out of service to be reported to security personnel. As part of the security system response, the operator would require lights to be t-umed on inside the vehicle and vehicle doors locked.
However, since the vehicles are in a maintenance yard, the operator does not want notification of routine authorized activity in the cars.
[00781 There are many states that must be taken into account for the transit security system to effectively enforce this policy. In this example, the important states. are the location of the train, the mode of the train (in service, out of service, or maintenance), and whether or not motion is detected within the train.
[00791 In this example, the system reads these states from interfaced onboard train systems and monitors these states for change. The system reads and monitors states from service devices 20 that provide services 30, such as train telemetry and control, motion detection, and lighting control.
[0080] If a service device 20 having a motion detection service 30 detects motion, it sends asynchronous state information 50 to the SOA notification interface 40.
Other asynchronous state information 50, such as train telemetry data indicating the state of the door (open or closed), mode information, and location of the train, are sent to the SOA
notification interface 40 via a train telemetry service 30. The interface 40 serializes the state information 50 and sends the serialized state information 60 to the rules engine 70.
[0081] The rules engine 70 applies the state inforrnation 60 to a previously configured Rule to determine a logical state 80. The logical state 80 will be "TRUE" if (a) there is motion within the train, (b) the train is an "out of service" mode, and (c) the train is located in a maintenance yard. This logical state 80 is now sent to the policy engine 90.
[00821 The policy engine 90 checks the state of the previously conf gured policy. If the policy is already "Active," then the logical state 80 is ignored. However, if the policy is not "Active", then the policy engine 90 moves the policy to the "Active" state and issues state change notifications 100, 170.
[0083] The device control engine 110 issues commands 140 to the SOA control interface 120. The SOA control interface 120 determines whether a target service exists.
If so, the SOA control interface 120 forwards the commands 130 to those specific services 30. In this case, a coxnnnand to turn on all lights would be sent to the lighting service and a command to lock all doors would be sent to the door lock service.
100841 The SOA notification interface 160 issues policy state change notifications 180 to any subscribed clients 190 to indicate that the policy is in an "active"
state. In this example, the clients 190 would be the operator's security workstations.
[0085] Once the operator has determined that there is no longer a security threat, the security workstation 190 can issue a command 191 to the SOA control interface 192 to clear the security policy. The SOA control interface 192 forwards this command 193 to the , configu.rable policy engine 90. If the policy is in an "Active" state, the policy engine 90 will clear the policy, i.e., making the policy "not Active" and issue state change notifications 100, 170. Alternately, a rule may be configured to change a policy state to "not Active."
[0086] The device control engine 110 issues commands 140 to the SOA control interface 120. The SOA control interface 120 determines whether a target service exists.
If so, the SOA control interface 120 forwards the commands 130 to those specific services 30. In this case, a command to turn off all lights would be sent to the lighting service and a command to unlock all doors would be sent to the door lock service.
[0087] The SOA notification interface 160 issues policy state change notifications 180 to ara.y subscribed clients 190 to indicate that the policy is no longer "Active." In this example, the clients 190 would be operator's security workstations.
[0088] In another example, consider a scenario where two or more cameras are monitoring the inside of a vehicle, and an ISEMS policy indicates a security event. The ZSEMS may command the recording of the same event by more than one camera to enable viewing of the event from multiple angles. When the image from a camera is unavailable, the ISEMS may control the recording of the event using the other camera.
(0089] In accordance with one aspect of the present embodiment, an exemplary method of operation of the ISEMS (as illustrated in FIG. 8) may include the steps of dynamically discovering one or more service-providing devices and their services within a security domain 800. Once the services have been discovered, the method involves acquiring asynchronous state information in about real-time from the discovered services 810. The next step 820 is to evaluate the asynchronous state information to determine one or more Boolean outcomes. The Boolean outcomes are then evaluated at step 830 to determine state changes of one or more security policies. As explained previously, the state change in a security policy may indicate a security event. When a state change is determined, the system may define a.ndlor initiate (at step 840) one or more actions to be followed to mitigate or resolve the security event. The various implementations and their advantages of these various steps have been described in earlier sections. It should be noted that such implementations may include a combination of more than one implementation (in no particular sequence) in order to gain the multitude of advantages that each one implem.entation-will offer.
[0090] In accordance with yet another aspect of the present embodiments, the above examples, demonstrations, and method steps may be implemented by suitable code on a processor-based system, such as general purpose or special purpose computer.
It should also be noted that different implementations of the invention may perform'some or all the steps described herein in different orders or substantially concurrently, that is, in parallel.
Furthermore, the functions may be implemented in a variety of prograzn.ming languages.
Such code, as will be appreciated by those of ordinary skill in the art, may be stored or adapted for storage in one or more tangible rnachine readable media, such as on memory chips, local or remote hard disks, optical disks or other media, which may be accessed by a processor based system to execute the stored code. In another example, the software may be embedded into the one or more hardware units to form embedded systems. Note that the tangible media may comprise paper or another suitable rnedium upon which the instructions are printed. For instance, the instructions may be electronically captured via optical scanning of the paper or other medium, then compiled, interpreted or otherwise processed in a suitable mai-iner if necessary, and then stored in a computer memory.
100911 Having thus described our invention with the detail and particularity required by the Patent Laws, what is desired protected by Letters Patent is set forth in the following claims.

Claims (24)

1. An integrated security event management system (ISEMS), based on service-oriented architecture, comprising one or more computers connected to one or more service-providing devices that transmit state information notifications, the one or more computers comprising one or more modules adapted to perform:
a) tasks to dynamically discover the service-providing devices and their services within a transit security domain in about real-time, wherein the service-oriented architecture allows for a uniform means of discovery;
b) tasks to acquire asynchronous state information notifications in about real-time from the discovered services, wherein the service-oriented architecture allows for a uniform means of sending and receiving the notifications;
c) tasks to determine one or more Boolean outcomes from the asynchronous state information in about real-time via a configurable rules engine, wherein the configurable rules engine is based on at least one of a Boolean, mathematical, statistical or combinational logic; and d) tasks to evaluate the one or more Boolean outcomes in about real-time via a configurable policy engine to determine state changes of one or more security policies, wherein a security policy state change indicates a security event, and wherein the policy engine associates rules with the one or more security policy states and defines actions to be followed when a security policy state change occurs.
2. The system of claim 1, further comprising tasks to emit notification of the one or more security events within a transit security domain in about real-time when evaluation of the one or more Boolean outcomes determines the presence of one or more security events, wherein the service-oriented architecture defines a means for providing the notification.
3. The system of claim 1, further comprising tasks to initiate one or more commands to the one or more services, wherein the service-oriented architecture defines a means for issuing the commands to the services and allows the service-providing devices to define and advertise their one or more commands.
4. The system of claim 1, wherein the service-providing devices communicate with the one or more computers via a transit communication network.
5. The system of claim 1, further comprising a configuration tool that identifies the discovered devices, their advertised services and states for use in configuring the system.
6. The system of claim 1, further comprising an agent to translate data from an ISEMS incompatible device to an ISEMS recognizable service representation.
7. The system of claim 1, wherein the service-oriented architecture is based on open standards.
8. The system of claim 1, further comprising a backup digital computer in communication with the one or more computers, the backup digital computer configured to switch roles with said one or more computers in an event of a failure of said one or more computers.
9. The system of claim 1, wherein the service-providing devices comprise at least one of onboard train control, train communication and train telemetry systems; access control systems; intrusion detection devices; audio detection devices; motion detection devices; audio content analysis devices; video content analysis devices; video recorders;
audio recorders; fire alarm devices; ground-based radar systems; biological sensors;
chemical sensors; firewalls; antivirus; and vulnerability management; a security event management system; an ISEMS; or combinations thereof.
10. A method for providing security event management using a mobile integrated security event management system comprising the steps of:
a) dynamically discovering one or more service-providing devices and their services within a transit security domain in about real-time;
b) acquiring asynchronous state information notifications in about real-time from the discovered services;

c) evaluating the acquired asynchronous state information notifications in about real-time to determine one or more Boolean outcomes, using at least one of a Boolean, mathematical, statistical or combinational logic; and d) evaluating the one or more Boolean outcomes in about real-time to determine state changes of one or more security policies and defining actions to be followed when a security policy state change occurs.
11. The method of claim 10, further comprising emitting notification of the one or more security events in about real-time when evaluation of the one or more Boolean outcomes determines the presence of one or more security events.
12. The method of claim 10, further comprising initiating one or more commands to the service-providing devices.
13. The method of claim 10, comprising con.figuring the system based on the discovered devices, their advertised services and states.
14. The method of claim 11, comprising sending information about the services, the asynchronous state information, the one or more Boolean outcomes, the security policies, the actions and the notifications to a database.
15. The method of claim 10, comprising translating data from an ISEMS
incompatible device to an ISEMS recognizable service representation
16. A computer-readable media, comprising code adapted to:
a) dynamically discover one or more service-providing devices and their services within a transit security domain in about real-time;
b) acquire asynchronous state information notifications in about real-time from the discovered services;
c) evaluate the acquired asynchronous state information notifications in about real-time to determine one or more Boolean outcomes using at least one of a mathematical, a statistical or a combinational logic; and d) evaluate the one or more Boolean outcomes in about real-time to determine changes in state of one or more security policies and defines actions to be followed when a security policy state change.
17. The computer readable media of claim 16, further comprising code adapted to provide notifications of the one or more security events in about real-time when evaluation of the one or more Boolean outcomes determines the presence of one or more security events.
18. The computer readable media of claim 16, further comprising code adapted to initiate one or more commands to service-providing devices.
19. A transit security system, comprising:
one or more service-providing devices, each service-providing device capable of performing one or more services; and at least one integrated security event management system adapted to perform one or more:
a) tasks to dynamically discover the service-providing devices and their services within a transit security domain in about real-time, wherein the service-oriented architecture allows for a uniform means of discovery;
b) tasks to acquire asynchronous state information notifications in about real-time from the discovered services, wherein the service-oriented architecture allows for a uniform means of sending and receiving the notifications;
c) tasks to determine one or more Boolean outcomes from the asynchronous state information in about real-time via a configurable rules engine, wherein the configurable rules engine is based on at least one of a Boolean, mathematical, statistical or combinational logic; and d) tasks to evaluate the one or more Boolean outcomes in about real-time via a configurable policy engine to determine state changes of one or more security policies, wherein a security policy state change indicates a security event, and wherein the policy engine associates rules with the one or more security policy states and defines actions to be followed when a security policy state change occurs; and an onboard-to-wayside communication system.
20. The transit system of claim 19, wherein the onboard-to-wayside communication system comprises a wireless communication network.
21. The transit system of claim 19, wherein a second ISEMS is a service-providing device for the at least one ISEMS, the second ISEMS communicating with the at least one ISEMS via the onboard-to-wayside communication system.
22. A transit security system, comprising:
a transit communication system;
one or more service-providing devices, each service-providing device capable of performing one or more services; and an integrated security event management system (ISEMS) adapted to perform one or more:
a) tasks to dynamically discover the service-providing devices and their services within a transit security domain in about real-time, wherein the service-oriented architecture allows for a uniform means of discovery;
b) tasks to acquire asynchronous state information notifications in about real-time from the discovered services, wherein the service-oriented architecture allows for a uniform means of sending and receiving the notifications;
c) tasks to determine one or more Boolean outcomes from the asynchronous state information in about real-time via a configurable rules engine, wherein the configurable rules engine is based on at least one of a mathematical, a statistical or a combinational logic; and d) tasks to evaluate the one or more Boolean outcomes in about real-time via a configurable policy engine to determine state changes of one or more security policies, wherein a security policy state change indicates a security event, and wherein the policy engine associates rules with the one or more security policy states and defines actions to be followed when a security policy state change occurs, wherein the mobile integrated security event management system uses the transit communication system to perform at least one of the tasks.
23. The transit security system of claim 22, wherein the transit communication system facilitates communication between the ISEMS and the one or more service-providing devices.
24. The transit security system of claim. 22, wherein the transit communication system facilitates communication between the ISEMS and an external device, wherein the external device is located outside a security domain within which the ISEMS
operates.
CA2663181A 2006-09-15 2007-08-31 Integrated security event management system Expired - Fee Related CA2663181C (en)

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
US84473006P 2006-09-15 2006-09-15
US60/844,730 2006-09-15
US11/847,463 2007-08-30
US11/847,463 US8091114B2 (en) 2006-09-15 2007-08-30 Integrated security event management system
PCT/US2007/077338 WO2008033684A2 (en) 2006-09-15 2007-08-31 Integrated security event management system

Publications (2)

Publication Number Publication Date
CA2663181A1 true CA2663181A1 (en) 2008-03-20
CA2663181C CA2663181C (en) 2014-05-27

Family

ID=39184458

Family Applications (1)

Application Number Title Priority Date Filing Date
CA2663181A Expired - Fee Related CA2663181C (en) 2006-09-15 2007-08-31 Integrated security event management system

Country Status (5)

Country Link
US (1) US8091114B2 (en)
EP (1) EP2074503B1 (en)
CN (1) CN101517564B (en)
CA (1) CA2663181C (en)
WO (1) WO2008033684A2 (en)

Families Citing this family (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8863234B2 (en) * 2008-08-06 2014-10-14 The Boeing Company Collaborative security and decision making in a service-oriented environment
FR2944117B1 (en) 2009-04-06 2014-05-09 Airbus France METHODS AND DEVICES FOR MANAGING EVENTS RELATING TO THE SAFETY OF COMPUTER AIRCRAFT SYSTEMS
CN101719914B (en) * 2009-11-10 2012-09-05 中国科学院计算技术研究所 Security event source integrated system and implementing method thereof
DE112011100626T5 (en) * 2010-02-22 2013-01-24 Avaya Inc. Secure, policy-based communication security and file sharing through mixed media, mixed communication modalities, and expandable to cloud computing, such as service-oriented architecture (SOA)
WO2012121714A1 (en) * 2011-03-09 2012-09-13 Hewlett-Packard Development Company, L.P. Performing a change process based on a policy
US8966392B2 (en) * 2011-08-29 2015-02-24 Novell, Inc. Event management apparatus, systems, and methods
US20130086376A1 (en) * 2011-09-29 2013-04-04 Stephen Ricky Haynes Secure integrated cyberspace security and situational awareness system
US8856936B2 (en) 2011-10-14 2014-10-07 Albeado Inc. Pervasive, domain and situational-aware, adaptive, automated, and coordinated analysis and control of enterprise-wide computers, networks, and applications for mitigation of business and operational risks and enhancement of cyber security
ES2691818T3 (en) * 2013-09-27 2018-11-28 Teleste Oyj Wireless data download system
US9466196B2 (en) * 2014-04-08 2016-10-11 Cubic Corporation Anomalous phenomena detector
US9734450B2 (en) 2014-06-05 2017-08-15 Lenovo Enterprise Solutions (Singapore) Pte. Ltd. Data loss prevention to remove false positives
CN105357170A (en) * 2014-08-21 2016-02-24 中兴通讯股份有限公司 Security service audit processing method and device
US9794290B2 (en) * 2015-02-26 2017-10-17 Symantec Corporation Quantitative security improvement system based on crowdsourcing
US9787719B2 (en) 2015-02-26 2017-10-10 Symantec Corporation Trusted third party broker for collection and private sharing of successful computer security practices
CN109428875B (en) 2017-08-31 2024-03-12 华为技术有限公司 Discovery method and device based on service architecture
CN109511115B (en) * 2017-09-14 2020-09-29 华为技术有限公司 Authorization method and network element
US10887292B2 (en) * 2018-04-18 2021-01-05 International Business Machines Corporation Obfuscated haptic interfaces with natural interaction steganography
KR102287052B1 (en) * 2019-12-10 2021-08-10 한국철도기술연구원 Multicast group based autonomous train control system security device supporting plug and play

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5629862A (en) 1994-08-30 1997-05-13 Electric Power Research Institute Rule-based procedure for automatic selection of contingencies in evaluation of dynamic security of a power distribution system
CA2263031A1 (en) * 1999-02-26 2000-08-26 Kasten Chase Applied Research Limited Communications based train control
US6839850B1 (en) * 1999-03-04 2005-01-04 Prc, Inc. Method and system for detecting intrusion into and misuse of a data processing system
US6820082B1 (en) 2000-04-03 2004-11-16 Allegis Corporation Rule based database security system and method
US7715819B2 (en) * 2001-08-03 2010-05-11 The Boeing Company Airborne security manager
US7418486B2 (en) * 2003-06-06 2008-08-26 Microsoft Corporation Automatic discovery and configuration of external network devices
US8452881B2 (en) * 2004-09-28 2013-05-28 Toufic Boubez System and method for bridging identities in a service oriented architecture
US7139887B2 (en) * 2003-12-31 2006-11-21 Veritas Operating Corporation Coordinated storage management operations in replication environment

Also Published As

Publication number Publication date
EP2074503A2 (en) 2009-07-01
WO2008033684A2 (en) 2008-03-20
CN101517564A (en) 2009-08-26
US20110184901A1 (en) 2011-07-28
EP2074503A4 (en) 2016-04-20
EP2074503B1 (en) 2019-05-08
CN101517564B (en) 2012-10-03
CA2663181C (en) 2014-05-27
US8091114B2 (en) 2012-01-03
WO2008033684A3 (en) 2008-10-02

Similar Documents

Publication Publication Date Title
EP2074503B1 (en) Integrated security event management system
Nanda et al. Internet of autonomous vehicles communications security: overview, issues, and directions
JP4124728B2 (en) Airborne security management program
CN106251578B (en) Stream of people&#39;s early warning analysis method and system based on probe
Kim et al. Research challenges and security threats to AI-driven 5G virtual emotion applications using autonomous vehicles, drones, and smart devices
US10317858B2 (en) Architecture and method for centrally controlling a plurality of building automation systems
US6947726B2 (en) Network security architecture for a mobile network platform
Saxena et al. General study of intrusion detection system and survey of agent based intrusion detection system
Kargl et al. Security engineering for VANETs
JP2006514757A (en) Method and system for efficiently performing event detection in multiple simultaneous video images
CN105407159A (en) Logistics transportation position service system
Khan et al. Statistical and neural classifiers to detect traffic operational problems on urban arterials
CN112468464B (en) State machine integrity verification system and method based on service chain
Suo et al. Merging safety and cybersecurity analysis in product design
Graf et al. Towards operational technology monitoring in intelligent transportation systems: Key challenges and research roadmap
Barletta et al. Machine learning for automotive security in technology transfer
Leinmüller et al. Intrusion detection in VANETs
Yadav et al. Architechture, applications and security for IOV: a survey
US10773685B2 (en) Implementing information exchange across IoT enabled vehicular devices for amplified dynamic security
Hasbini et al. The Smart Cities Internet of Access Control, opportunities and cybersecurity challenges
Hemalatha et al. Intelligent parking system using vehicular data cloud services
CN108564050A (en) A kind of two visitors one based on the video enterprise supervision personnel that endanger inspect the sentries method and system
Boughanja et al. A comparative study of detection algorithm in vanet network
Chen et al. Internet of vehicle things communication based on big data analytics integrated internet of things
Pasic et al. ZONESEC: built-in cyber-security for wide area surveillance system

Legal Events

Date Code Title Description
EEER Examination request
MKLA Lapsed

Effective date: 20220301

MKLA Lapsed

Effective date: 20200831